AI is massive right now, and many businesses have had direction from their Board, CEO or other executives demanding that the business makes use of AI. Unfortunately, some are jumping in with two feet and not really planning their AI journey. So, the question remains, how to get started in… Continue Reading How to get started in AI
This article outlines a strategic roadmap for organisations beginning on their digital transformation journey. It walks through the key phases – assessment, goal setting, pilot testing, scaling and covering cultural change and compliance – offering insights into aligning technology adoption with long-term business objectives. It emphasises change management and stakeholder… Continue Reading Digital Transformation Roadmap: From Legacy to Innovation
In the past few months, I have been sharing my views about cybersecurity myths – some of them held by the public, and some myths are still held (and propagated) by cybersecurity professionals and companies. One that may have been true at one time, but is no longer the case,… Continue Reading Cybersecurity Myths – the perimeter is the protection
In my recent theme of breaking common cybersecurity myths, I have been revealing some commonly held beliefs that even cybersecurity professionals will stand by. Today, I will look at the “most common passwords” and challenge whether they really are as common as we are told. Most common passwords A quick… Continue Reading Cybersecurity Myths – people use bad passwords
For anyone working in Cybersecurity, it can be hard to convince your board to understand the issues, and to invest money or focus on Cyber Security issues. I have presented Cyber issues to multiple Boards, and here is my advice on how to get Boards to understand Cybersecurity issues –… Continue Reading Cybersecurity for boards – analogy to Health & Safety
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – my home network is safe
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – my password use does not matter
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – phones are safe
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – changing passwords
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – It’s not my responsibility
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – I’ve got a firewall
Even with the gradual increase in cybersecurity literacy amongst the masses, there are still some myths that people follow religiously, even Cybersecurity professionals. I will set out to bust some of those myths here. Many of the myths have come from companies advertising products as a “silver bullet” solution, some… Continue Reading Cybersecurity Myths – I’m not a target
Creation of good policies and procedures is an art that can be helped with some core advice. Policies are the backbone of how a business tells their employees how to act and react, and ensures consistency and productivity. A great company culture, a consistent vision and values, and compliance with… Continue Reading Creating good policies and procedures
Yesterday, there was a world-wide incident that affected computers running CrowdStrike Falcon, where there was a conflict between the vendor’s anti-malware protection and the Windows sensor, resulting in a BSOD and unresponsive computers. This is a major incident that was effectively the effective impact as we were expecting from the… Continue Reading Lessons from the CrowdStrike incident
Are you fully across your supply chain and 3rd party risks? Are you aware of all the other people outside of your organisation who could have access to your systems or data? There are many issues and threats that can occur when you lose track of who is accessing your… Continue Reading Supply chain and 3rd Party risks
The technology industry is no different to many other industries and businesses – in that it has jargon and terminology that may often need to be defined to be understood. Within IT, the term “n-1” means that you are one version or release behind the most recent. This is part… Continue Reading N-1 patching strategy
Hacking is a very asymetrical endeavour – the hacker can get big rewards for a little effort. The hackers tickery will include ways to get a unwitting victim to click on a link or to get past usual defences. As I have mentioned before, the trickery of hackers only needs… Continue Reading The trickery of hackers
On International Women’s Day, I am reminded of the need for diversity in the workforce, and want to pose the question of what does diversity mean to you? Diversity is not just the inclusion of other races, genders and backgrounds. More than just a blind quota of non-white, non cisgender,… Continue Reading What does diversity mean to you?
A fearful catch-cry recently is that AI will steal our jobs – but is this really true? Since Chat-GPT and other generative AI systems have become available, there is a broad fear that it will start to take over and force people out of their comfortably held jobs. It has… Continue Reading AI will steal our jobs – really?
Terminology around privacy and security often will use the term “PII” – to refer to “Personally Identifiable Information”. However, PII in Australia is not a valid term – the definition by the OAIC is “personal information”, and it differs from the US term (from NIST) and the legal obligations around… Continue Reading PII in Australia and personal information